Balazs Varga

Results 56 comments of Balazs Varga

> @SCLogo i checked, in my case the docker config file exists in all the nodes. i even tried comenting out the > > ``` > imagePullSecrets: > - name:...

last worked version was 1.25.4 Ip is just fake ip Cluster was created with 1.26.3 binary and then the config was exported with 1.25.4. binary. In that case it worked,...

the only difference is : on 1.25.4 the config contains: ``` clusters: - cluster: server: https://internal.cluster-api.control.example.com:8443 ``` on 1.26.3 ``` clusters: - cluster: server: https://api.internal.cluster-api.control.example.com8443 ```

In config we set the masterInternal and masterPublic, but when I do the kops update cluster I don't see the internal one on the final config.

with ansible we set the following lines after we created the cluster config with kops create cluster ``` masterPublicName: https://cluster-api.control.example.com:8443 masterInternalName: https://internal.cluster-api.control.example.com:8443 ``` after that a kops update cluster set...

last time I tried that one but had a problem with export... maybe on that time we could not export using sans address only ? is that possible? our real...

api subdomain would be ok for us as well, but as I see in export it exports the dns of the LB and not the `api.internal.cluster-api.control.example.com` with port 8443. Any...

no. probably that is the missing part ?

config: ``` apiVersion: kops.k8s.io/v1alpha2 kind: Cluster metadata: creationTimestamp: "2023-06-21T08:22:34Z" name: testcluster-api.control.example.com spec: rollingUpdate: maxSurge: 50% kubeControllerManager: enableProfiling: false terminatedPodGCThreshold: 10 featureGates: RotateKubeletServerCertificate: "true" kubeScheduler: enableProfiling: false kubeAPIServer: enableProfiling: false auditLogMaxAge:...

cluster.spec: ``` apiVersion: kops.k8s.io/v1alpha2 kind: Cluster metadata: creationTimestamp: "2023-06-21T08:22:34Z" name: testcluster-api.control.example.com spec: additionalPolicies: master: | [ { "Effect": "Allow", "Action": [ "kms:Decrypt", "kms:Encrypt" ], "Resource": [ "aws_arn_key" ] } ]...